Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-17005

Опубликовано: 08 янв. 2020
Источник: debian
EPSS Низкий

Описание

The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
firefoxfixed71.0-1package
firefox-esrfixed68.3.0esr-1package
thunderbirdfixed1:68.3.0-1package

Примечания

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-36/#CVE-2019-17005

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-37/#CVE-2019-17005

  • https://www.mozilla.org/en-US/security/advisories/mfsa2019-38/#CVE-2019-17005

EPSS

Процентиль: 86%
0.02867
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
около 6 лет назад

The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.8
redhat
около 6 лет назад

The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.8
nvd
около 6 лет назад

The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.8
github
больше 3 лет назад

The plain text serializer used a fixed-size array for the number of <ol> elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.

CVSS3: 8.8
fstec
около 6 лет назад

Уязвимость механизма сериализации веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием проверки размера вводимых данных при использовании буфера, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных

EPSS

Процентиль: 86%
0.02867
Низкий